• Another World Source Code Review

    Dedicated to the nerds grown in the 90s Recently i have read an interesting article by Fabien Sanglard about a milestone of videogames: “Another World”. I spent two weeks reading and reverse engineering further the source code of Another World(“Out Of… read more »
  • Brienne and Tormund: love is in the air?

    Just for fun… From WikiOfThrones: Brienne has come to Castle Black for the first time and it looks like she already has a male admirer. This admirer is not a brother of the night’s watch but the wildlingTormund. Although the thought… read more »
  • My Weekly #Roundup #73 — #LinkedIn #TeslaCrypt #MrRobot

    What happened relevant this week? Linkedin, Teslacrypt and other fun stuff! Security & Privacy http://xkcd.com/1683/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Geekness http://www.commitstrip.com/en/2016/05/19/the-childhood-of-a-coder-if-only-it-were-a-game/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]https://youtu.be/-ymNGu8C-as[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Programming http://www.commitstrip.com/en/2016/05/17/understanding-dev-culture/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] http://abstrusegoose.com/249 [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Music [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed]… read more »
  • 117 Million LinkedIn Emails And Passwords for sale on dark web

    LinkedIn’s 2012 data breach was more serious than previously thought http://trdealmgn4uvm42g.onion/listing/3600 An hacker, who goes by the name peace_of_mind, is trying to sell the account information, including emails and passwords, of 117 million LinkedIn users, and says that the data… read more »
  • Raspberry Pi + Thermal Printer = Instant Camera!

    An undeniably fun project: a camera made with a Raspberry Pi Model A+ with the Pi Camera Board and a thermal receipt printer. https://vine.co/v/iQbiAxKnwFP Coming it around $90 total for everything, more information on Adafruit’s Website. … read more »
  • CVE-2016–1287: Cisco ASA Software IKEv1 / IKEv2 Buffer Overflow, proof of concept released

    Exodus Intelligence have released the proof of concept code on their GitHub page On February, 10 2016 a vulnerability related to the Internet Key Exchange (IKE) protocol implementation of Cisco devices (CVE-2016–1287) was ufficially released. Yesterday, the researchers who found this… read more »
  • Check and Fix SD Card from the android terminal emulator

    Your Android SD card gets “corrupted” and you don’t have a PC to connect the smartphone and make the check of SD card? It’s possibile to make this operation directly from the smartphone? (rooted and with busybox installed, of course!)… read more »
  • A Memory Access Violation in Symantec Antivirus Engine could crash your windows system

    Symantec’s Anti-Virus Engine was susceptible to memory access violation due to a kernel-level flaw when parsing a specifically-crafted PE header file. The most common symptom of a successful attack would result in an immediate system crash, aka. Blue Screen of Death… read more »
  • Microsoft will double the number of Ads in the start menu of Windows 10?

    I just read this on The Verge: [embed]http://www.theverge.com/2016/5/16/11682164/microsoft-windows-10-promoted-apps-start-menu-anniversary-update[/embed] Seriously? Ads? But, what kind of Ads? Really, by reading the article it turns out that the “Ads” are just placeholders for applications that Microsoft ‘recommends’ for download, differentiated by country: Promoted apps… read more »
  • SQL Injection in a Nutshell

    Ay Caramba! … read more »
  • Crashing OSX and iOS apps with a simple PNG image

    Lander Brandt has discovered a denial of service vulnerability in ImageIO, a library of utilities for parsing various image formats. Which apps as affected? It’s used in many OS X and iOS applications including: Tweetbot Safari Messages Mail Preview Some… read more »
  • Practical Malware Analysis, a complete starter kit

    Anyone who works in cybersecurity should read Practical Malware Analysis. Topics covered are the following: Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and… read more »
  • CVE-2016–4117: a new Adobe Flash 0-DAY in the wild

    Adobe has released a patch (APSB16–15) for a flash vulnerability (CVE-2016-4117) detected on May 8, 2016 by FireEye. FireEye has discovered an attack method based on embedding the Flash exploit inside a Microsoft Office document. The attacker hosts the MSOffice… read more »
  • Fast de-obfuscation of javascript code

    In the last days, I had to examine the obfuscated JavaScript code inside of some malicious html pages. The original javascript code The obfuscation method is the classic ‘array-mapped’: you declare an array of functions and variable names that will… read more »
  • Viking Horde: a new malware attacks Android devices

    A new type of malware is targeting Android devices via infected apps at the Google Play app store. The new threath was discovered by security firm Check Point: The Check Point research team uncovered a new Android malware campaign on… read more »
  • WhatsApp releases desktop apps for windows and mac: the reactions from the major tech sites and…

    On Tuesday, WhatsApp launched its first-ever native desktop app, available on both Windows 8 and Mac OS 10.9 or above, as the company said in this blog post: [embed]https://blog.whatsapp.com/10000621/Introducing-WhatsApps-desktop-app[/embed] To download the app, visit https://www.whatsapp.com/download from your desktop browser. Then,… read more »
  • ImageMagick bug puts countless websites at risk of hijacking

    From ImageMagick forum: We have recently received vulnerability reports for certain coders, they include possible remote code execution and ability to render files on the local system. These vulnerabilities will be addressed in versions 7.0.1–1 and 6.9.3–10, which are due… read more »
  • My Weekly #Roundup #71 - #Slack #GameOfThrones #SteveVai #AndyMcKee

    Interesting things that i read in the last week! nn nnn nn Security & Privacy n nn n n Decryption Tool Stifles Jigsaw Ransomware Security n n n 3 Requirements for Effective Security Investigations Security n n n 5 Ways… read more »
  • Yngwie J. Malmsteen, Black Star Intro: my transcription

    “Black Star” is the first track from Yngwie Malmsteen’s album Rising Force The Artist Yngwie Johan Malmsteen, born Lars Johan Yngve Lannerbäck on 30 June 1963, is a Swedish guitarist. He was heavily influenced by classical music, particularly 19th century… read more »
  • Tor in a company network: how to detect and block it?

    TOR is an important tool. It has its benefits and it could be the perfect way for end users to cover their tracks, but the use of this tool in a corporate network can open up organizations to some risks.… read more »